Impact
The vulnerability resides in the readRequestBody() function of the MCP-Framework, where request body fragments are concatenated into a string with no enforced size limit. This allows an unauthenticated attacker to send an excessively large POST payload to the /mcp endpoint, causing the server to consume growing amounts of memory until it crashes. The flaw results in a Denial of Service (DoS) condition that prevents legitimate clients from accessing the service.
Affected Systems
The affected product is QuantGeekDev’s mcp-framework, specifically versions 0.2.21 and older. Any deployment of an MCP server built with these releases that exposes the HTTP transport is at risk. The defect was addressed in version 0.2.22.
Risk and Exploitability
The vulnerability scores a high CVSS score of 8.7 and is not listed in the CISA KEV catalog, indicating a serious condition but lacking evidence of active exploitation. The attack vector is straightforward: a single, unauthenticated HTTP POST request to /mcp with a very large body. Because no authentication or size checks are applied, exploitation requires only network connectivity to the server, making it highly feasible for remote attackers.
OpenCVE Enrichment
Github GHSA